• Main Menu
  • Input Devices

    • How a Wireless Mouse Works

      How a Wireless Mouse Works

      The mouse is an extremely popular device. While the majority of mice are connected directly to the computers peripheral input via a cord and the computer’s main power powers it, wireless mice are becoming extremely popular as they give computer users cordless accessibility to their mice and their computer. Wireless Mouse Technology Wireless mice usually

    • How to Replace a MacBook Keyboard

      How to Replace a MacBook Keyboard

      An Apple MacBook can last some time without the keyboard getting damaged. If the keyboard gets damaged (for e.g. a loose key falls out of the setting) or the user simply wants a new keyboard, he/she will need to replace the keyboard in question. The MacBook has a fairly simple case that users with the

    • Flatbed Scanner – Pros and Cons

      Flatbed Scanner – Pros and Cons

      A flatbed scanner is a device that is able to scan a document and then convert what it has read into digital information. Flatbed scanners are different from other types of scanner because flatbed scanners allow the user to simply lay the document down on the machine, close the lid, and scan both sides of

    • What is a Biometric Coprocessor?

      What is a Biometric Coprocessor?

      A biometric coprocessor is a device that is capable of scanning a user’s physical attributes in order to allow access to a building or computer network. A biometric coprocessor is essentially a fingerprint reader, but may also include sensors that analyze the user’s eyes, voice, or even breath. The term “biometric coprocessor” comes from the

    • Wireless Keyboards

      Wireless Keyboards

      To provide additional portability to computer users, IT manufacturers have created wireless keyboards that do not have to be kept at the user's desk. Wireless keyboards can be used by both desktop and laptop users as the technology used in wireless keyboards is universal to all computer models. While wireless keyboards may offer additional mobility

    • Fingerprint Scanners

      Fingerprint Scanners

      Fingerprint scanners are biometric security systems designed to use the distinct features of an individual's fingerprints to provide security. Fingerprint scanners are now being used in police stations, security-intensive industries and, most recently, on computer shops as a peripheral device for computers. Biology of a Fingerprint Every person has marks on his fingers. These marks

    • Pointing Devices

      Pointing Devices

      A pointing device is any piece of hardware that is used to allow a user to input spatial data to a computer. By moving a mouse, pen or a finger around, a user can implement movements and changes on the computer screen. The most common type of pointing device is the mouse and the arrow.

    • How to Setup the Fingerprint Reader on HP Laptops

      How to Setup the Fingerprint Reader on HP Laptops

      One of the more interesting pieces of technology that has been released for the laptop computer is the fingerprint reader, which makes logging into a computer so much easier. The software that HP laptops use is Bioscrypt’s VeriSoft Access Manager. By sliding one’s finger across a small metallic sensor, the software is able to read

    • What is a Pressure Transmitter?

      What is a Pressure Transmitter?

      A pressure transmitter or pressure sensor is a device that measures pressure in a liquid, fluid, or gas. Pressure transmitters are commonly used to measure pressure inside of industrial machinery in order to alert the user before a catastrophe occurs. They have many different uses, most of which are industrial or automotive in nature. A

    • How to Lock a Keyboard

      How to Lock a Keyboard

      Many people install security features on their computer in order to prevent unauthorized users from accessing the computer when they are away. For example, login identification, file encryption, and even biometric identification are all sufficient methods of keeping intruders out of someone’s personal information. However, some users may wish to go even further by locking

    input-devices
    136 queries in 0.306 seconds.